This indicates an attack attempt to exploit a Memory Corruption Vulnerability in Foxit Software PhantomPDF
A remote attacker could exploit this vulnerability by enticing a user to open a crafted PDF document. Successful exploitation could allow the attacker to execute arbitrary code in the context of the application.
Foxit Software Foxit Reader 126.96.36.19926 and earlier
Foxit Software PhantomPDF 188.8.131.52677 and earlier
System Compromise: Remote attackers can gain control of vulnerable systems.
Apply the most recent upgrade or patch from the vendor: